The following report is now a complimentary offering from MEMRI’s Jihad and Terrorism Threat Monitor (JTTM). For JTTM subscription information, click here. On June 9, 2022, the Islamic State (ISIS) released issue 342 of its weekly newsletter Al-Naba’. The issue features an editorial titled “One Ending, Countries Torn Apart,” which comments […]
Supreme Court’s digital shift marks its 121st
THE Supreme Court (SC) is gearing up for digital shift to meet the rapid development in the digital economy, as it celebrates its 121st anniversary. SC was established on June 11, 1901, by the Second Philippine Commission through the enactment of Act No. 136, which abolished the Real Audiencia de […]
Kenya’s controversial “ICT Practitioners Bill” is closer to becoming law
On Wednesday, Kenya’s 12th parliament passed the controversial 2020 proposal that seeks to regulate “anyone who employs technologies to collect, process, store or transfer information for a fee”. First introduced in 2016 by majority leader, Aden Duale, and supported by Kenyan MP, Godfrey Osotsi, the wide-sweeping and vague ICT Practitioners Bill […]
Should the Solicitor General Recommend Allowing Foreign Corporations to Claim Immunity?
On Monday, the Supreme Court called for the views of the Solicitor General in NSO Group Technologies Ltd. v. WhatsApp Inc. The Ninth Circuit held that NSO Group Technologies Ltd and Q Cyber Technologies Ltd (collectively, NSO) could not claim immunity from suit under federal common law for alleged violations […]
OODA Loop – Will the United States Enact a National Data Privacy Law?
In the aftermath of massive data breaches that have exposed the personal identifiable and financial information of millions of people around the globe, it became clear that there has beena need for legally-mandated data protection. Europe leapt to the forefront, implementing its General Data Protection Regulation (GDPR), a comprehensive law […]
Negligence, poor systems make South Africa cyber crime heaven
Criminals are taking advantage of the negligence and weak control systems in South African organisations to mine sensitive data in the country, where cyber attacks are on the rise. The South African government and companies can no longer sweep cyber hacking incidents under the carpet, thanks to the Cybercrimes Act […]